The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script.  NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74 - | |
| References | () http://www.openwall.com/lists/oss-security/2010/05/21/2 - | |
| References | () http://www.openwall.com/lists/oss-security/2010/05/25/2 - | 
Information
                Published : 2010-06-22 17:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-1638
Mitre link : CVE-2010-1638
CVE.ORG link : CVE-2010-1638
JSON object : View
Products Affected
                horde
- horde
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
